Virus propagation: threshold conditions for multiple profile networks

  • Angeliki RaptiEmail author
  • Kostas Tsichlas
  • Spyros Sioutas
  • Giannis Tzimas
Regular Paper


Imagine that we have a highly competing virus that is spreading over a (e.g., social) network where users have different sensitivity/interest against it. A virus may be anything that has a “spreading” behavior such as a rumor, a social media trend or even an infectious disease. Is it possible to predict the outcome in such a viral phenomenon and compute the number of users that will eventually get infected? We answer this question by providing qualitative and quantitative thresholds that describe the behavior of the virus in a given network. Our main contribution is that for the first time, the case of a heterogeneous (with respect to the nodes) network is analytically tackled. We model the different sensitivity to the virus by dividing the nodes of the network into different groups. Each group has a particular profile describing its behavior toward the virus. Conditions are provided based on certain network characteristics that govern the extent of the infection. These conditions are experimentally verified by extensive experiments.


Epidemics Virus propagation model Profiles Fixed points 



  1. 1.
    Anderson R, May RM (1992) Infectious diseases of humans. Oxford University Press, OxfordGoogle Scholar
  2. 2.
    Aral S, Walker D (2012) Identifying influential and susceptible members of social networks. Science 337(6092):337–41MathSciNetCrossRefGoogle Scholar
  3. 3.
    Bailey N (1975) The mathematical theory of infectious diseases and its applications. Griffin, LondonzbMATHGoogle Scholar
  4. 4.
    Beutel A, Prakash BA, Rosenfeld R, Faloutsos C (2012) Interacting viruses in networks: Can both survive? In: Proceedings of the 18th ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’12. ACM, New York, pp 426–434Google Scholar
  5. 5.
    Boost. Boost c++ graph library. Accessed 4 Apr 2016
  6. 6.
    Chazelle B (2010) Analytical tools for natural algorithms. In: Innovations in computer science: ICS 2010, Tsinghua University, Beijing, China, January 5–7, 2010. Proceedings, pp 32–41. Tsinghua University PressGoogle Scholar
  7. 7.
    Ganesh AJ, Massoulié L, Towsley DF (2005) The effect of network topology on the spread of epidemics. In: INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies, 13–17 March 2005, Miami, FL, USA, pp 1455–1466Google Scholar
  8. 8.
    Gould H, Tobochnik J (2010) Statistical and thermal physics: with computer applications. Princeton University Press, PrincetonzbMATHGoogle Scholar
  9. 9.
    Hethcote HW (2000) The mathematics of infectious diseases. SIAM Rev 42(4):599–653MathSciNetCrossRefGoogle Scholar
  10. 10.
    Hirsch MW, Smale S (1974) Differential equations, dynamical systems and linear algebra. Academic Press, CambridgezbMATHGoogle Scholar
  11. 11.
    Kephart JO, White SR (1993) Measuring and modeling computer virus prevalence. In: 1993 IEEE computer society symposium on research in security and privacy, Oakland, CA, USA, May 24–26, 1993, pp 2–15Google Scholar
  12. 12.
    KONECT (May, 2016a) Dblp co-authorship network dataset. Accessed 4 May 2016
  13. 13.
    KONECT (May, 2016b) Skitter network dataset. Accessed 4 May 2016
  14. 14.
    Leskovec J, Kleinberg J, Faloutsos C (2007) Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data 1(1):2CrossRefGoogle Scholar
  15. 15.
    Leskovec J, Lang KJ, Dasgupta A, Mahoney MW (2009) Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters. Internet Math 6(1):29–123MathSciNetCrossRefGoogle Scholar
  16. 16.
    Lum K, Swarup S, Eubank S, Hawdon J (2014) The contagious nature of imprisonment: an agent-based model to explain racial disparities in incarceration rates. J R Soc Interface 11(98):20140409CrossRefGoogle Scholar
  17. 17.
    McKendrick AG (2011) Applications of mathematics to medical problems. Proc Edinb Math Soc 14:98–130Google Scholar
  18. 18.
    Pastor-Satorras R, Vespignani A (2001) Epidemic spreading in scale-free networks. Phys Rev Lett 86:3200–3203CrossRefGoogle Scholar
  19. 19.
    Prakash BA, Beutel A, Rosenfeld R, Faloutsos C (2012) Winner takes all: competing viruses or ideas on fair-play networks. In: Proceedings of the 21st international conference on world wide web, WWW ’12. ACM, New York, pp 1037–1046Google Scholar
  20. 20.
    Prakash BA, Chakrabarti D, Faloutsos M, Valler N, Faloutsos C (2011) Threshold conditions for arbitrary cascade models on arbitrary networks. In: Proceedings of the 2011 IEEE 11th international conference on data mining, ICDM ’11. IEEE Computer Society, Washington, pp 537–546Google Scholar
  21. 21.
    Rapti A, Sioutas S, Tsichlas K, Tzimas G (2015) Virus propagation in multiple profile networks. In: Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining, Sydney, NSW, Australia, August 10–13, 2015, pp 975–984Google Scholar
  22. 22.
    Wei X, Valler N, Prakash BA, Neamtiu I, Faloutsos M, Faloutsos C (2013) Competing memes propagation on networks: a case study of composite networks. IEEE J Sel Areas Commun 6(31):1049–1060CrossRefGoogle Scholar
  23. 23.
    Yang J, Leskovec J (2012) Defining and evaluating network communities based on ground-truth. In: ACM SIGKDD workshop on mining data semantics. ACM, p 3Google Scholar

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2018
corrected publication December/2018

Authors and Affiliations

  1. 1.University of PatrasPatrasGreece
  2. 2.Aristotle University of ThessalonikiThessaloníkiGreece
  3. 3.Ionian UniversityCorfuGreece
  4. 4.Technological Educational Institute of Western GreecePatrasGreece

Personalised recommendations